The Internet of Things & Wearable Technology

Total Page:16

File Type:pdf, Size:1020Kb

The Internet of Things & Wearable Technology *** not of citation – WORKING DRAFT for AEI / FCC conf. on “Regulating the Evolving Broadband Ecosystem,” Sept. 11, 2014 *** The Internet of Things & Wearable Technology: Addressing Privacy & Security Concerns without Derailing Innovation By Adam Thierer* I. INTRODUCTION .............................................................................................................. 2 II. THE GROWTH OF THE INTERNET OF THINGS & WEARABLE TECH: APPLICATIONS AND OPPORTUNITIES.............................................................................................................. 4 A. The Internet of Things Arrives ............................................................................................. 4 B. The Expanding World of Wearables .................................................................................. 11 C. The Sci-Fi Future of Wearables: Implantables, Ingestibles & “Biohacking” ...................... 19 III. WHICH POLICY VISION WILL GOVERN THE INTERNET OF THINGS & WEARABLE TECH? ... 22 A. Permissionless Innovation vs. the Precautionary Principle ............................................... 23 B. The Problem with Precautionary Principle-Based Policymaking ....................................... 27 C. The Importance of Regulatory Patience & Humility .......................................................... 29 IV. HOW THE INTERNET OF THINGS CHALLENGES TRADITIONAL PRIVACY NORMS & LEGAL STANDARDS .................................................................................................................. 31 A. Growing Privacy-Related Regulatory Interest in the IoT & Wearables ............................. 31 B. IoT & the FIPPs ................................................................................................................... 32 C. Limitations of the Traditional “Notice & Consent” Model for IoT ..................................... 34 D. The Possible Move toward Use Restrictions for the IoT.................................................... 36 E. The Problem of “Privacy Paternalism” & the Limits of Privacy “Harm” ............................ 37 F. First Amendment-Related Hurdles to the Regulation of IoT & Wearable Tech ................ 41 V. THE ROLE OF RESILIENCY & GRADUAL SOCIAL ADAPTATION .......................................... 43 A. From Resistance to Resiliency ........................................................................................... 43 B. Case Study: The Rise of Public Photography ..................................................................... 45 VI. CONSTRUCTIVE SOLUTIONS TO COMPLEX PROBLEMS ................................................... 46 * Senior Research Fellow, Mercatus Center, George Mason University. Note: Portions of this paper have been adapted from Adam Thierer, PeRMISSIONLESS INNOVATION: THE CONTINUING CASE FOR COMPREHENSIVE TECHNOLOGICAL FREEDOM (2014). The author wishes to thank the following individuals for their helpful comments on various drafts of this paper: Robert Graboyes, Jerry Brito, Dan Caprio, Ryan Hagemann, Ryan Radia, and two anonymous reviewers. 1 Electronic copy available at: http://ssrn.com/abstract=2494382 A. Digital Literacy: How Education & Etiquette Can Help ...................................................... 47 B. Best Practices & Self-Regulation: Privacy & Security “By Design”..................................... 49 C. Empowerment Solutions ................................................................................................... 55 D. Common Law Solutions, Evolving Liability Standards & Other Legal Recourses ............... 56 E. Federal Trade Commission Oversight & Enforcement ...................................................... 59 F. Social Norms, Pressure & Sanctions .................................................................................. 61 G. Law Enforcement Guidelines and Restrictions .................................................................. 64 VII. CONCLUSION ................................................................................................................ 65 I. INTRODUCTION The next great wave of Internet-enabled innovation has arrived and it is poised to revolutionize the way humans interact with the world around them. This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. Wearable technologies are networked devices that can collect data, track activities, and customize experiences to users’ needs and desires. These technologies are a subset of the Internet of Things, which refers to networked “smart devices” equipped with microchips, sensors, and wireless communications capabilities.1 Wearable technologies are among the fastest growing segment of the Internet of Things (IoT) and promise to have widespread societal impacts in coming years.2 As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other barriers exist that could hold back IoT and wearable tech—including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate wireless networking—but those issues are not dealt with here.3 Some IoT technologies will raise safety issues, but those are only 1 Charles McLellan, M2M and the Internet of Things: A guide, ZD NET, Jan. 10, 2013, http://www.zdnet.com/m2m-and-the-internet-of-things-7000008219. 2 David Evans, The Future of Wearable Technology: Smaller, Cheaper, Faster, and Truly Personal Computing, LINKEDIN, Oct. 24, 2013, http://www.linkedin.com/today/post/article/20131024145405-122323-the-future-of- wearable-technology-smaller-cheaper-faster-and-truly-personal-computing. 3 Bob Violino, The Internet of Things Gets Real, NETWORK WORLD, June 2, 2014, http://www.networkworld.com/news/2014/060214-internet-of-things-281935.html?hpg1=bn; (quoting Daniel Castro, director of the Information Technology and Innovation Foundation’s Center for Data Innovation in Washington, saying: “A big issue is standards and interoperability. … Building the IoT will require massive amounts of cooperation and coordination between firms.”) 2 Electronic copy available at: http://ssrn.com/abstract=2494382 briefly addressed here. The focus of this article will be on the privacy and security concerns that are already prompting calls for policy interventions.4 Some of the privacy and security concerns about IoT and wearable technologies are legitimate and deserve responses. But those responses should not be “top-down” or command-and- control in nature. Privacy and security are important values worthy of attention, but so too are innovation, entrepreneurialism, economic growth, price competition, and consumer choice. Regulation—especially regulation of fast-moving, rapidly-evolving technologies—is likely to be premature, overly-rigid, and unlikely to allow the many beneficial uses of these technologies.5 This would be highly unfortunate since these technologies “will have profound implications for addressing important social and economic issues.”6 Generally speaking, therefore, barring clear evidence of direct risk to health or property—not merely hypothetical or ephemeral fears—policymakers should not impose prophylactic restrictions on the use of new wearable technologies and the Internet of Things. The default position toward these technologies should be “innovation allowed” or “permissionless innovation.”7 The burden of proof rests on those who favor precautionary regulation to explain why ongoing experimentation with Internet of Things technologies should be prevented preemptively by force of law. The better alternative to top-down regulation is to deal with concerns creatively as they develop using a combination of educational efforts, technological empowerment tools, social norms, public and watchdog pressure, industry best practices and self-regulation, transparency, and targeted enforcement of existing legal standards (especially torts) as needed. This “bottom- up” and “layered” approach to dealing with problems will not preemptively suffocate experimentation and innovation in this space. This paper concludes by outlining these solutions. Finally, and perhaps most importantly, we should not overlook the role societal and individual adaptation will play here, just as it has with so many other turbulent technological transformations. Even though formidable privacy and security challenges await, individuals and institutions will adjust in an evolutionary, resilient fashion, just as they have to earlier disruptive technologies. 4 Scott R. Peppet, Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security & Consent, TEXAS L. REV. (forthcoming, 2014), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2409074. 5 Daniel F. Spulber, Unlocking Technology: Antitrust and Innovation, 4 JOURNAL OF COMPETITION LAW & ECONOMICS 965 (2008) (“Governments are notoriously inept at picking technology winners. Understanding technology requires extensive scientific and technical knowledge. Government agencies cannot expect to replicate or improve upon private sector knowledge. Technological innovation is uncertain by its very nature because it is based on scientific discoveries. The benefits of new technologies and the returns
Recommended publications
  • Remembering Through Lifelogging: a Survey of Human Memory Augmentation
    Remembering through lifelogging: a survey of human memory augmentation Morgan Harveya,∗, Marc Langheinrichb, Geoff Wardc aDepartment of Maths and Information Sciences, Northumbria University, Newcastle, UK morgan. harvey@ northumbria. ac. uk , Tel: +44 (0)191 349 5929 bFaculty of Informatics, Universit`adella Svizzera italiana (USI), Switzerland cDepartment of Psychology, University of Essex, UK Abstract Human memory is unquestionably a vital cognitive ability but one that can often be unreliable. External memory aids such as diaries, photos, alarms and calendars are often employed to assist in remembering important events in our past and fu- ture. The recent trend for lifelogging, continuously documenting ones life through wearable sensors and cameras, presents a clear opportunity to augment human memory beyond simple reminders and actually improve its capacity to remember. This article surveys work from the fields of computer science and psychology to understand the potential for such augmentation, the technologies necessary for realising this opportunity and to investigate what the possible benefits and ethical pitfalls of using such technology might be. Keywords: Lifelogging, Augmented Human Memory, Personal Life Archives 1. Introduction Human memory is a critical cognitive function that we rely on almost con- stantly in our everyday lives. External memory aids are often used to help support memory for past events; photographs help us to remember autobiographical events such as holidays, we use recorded minutes to help us remember the content of meet- ings, and revision notes to remember lectures. Similarly, post-it notes, alarms, and interactive calendars and reminders help us to remember future events. Such aids often require some planning and conscious effort to initiate and record, and provide external support for only a small proportion of all past and future events.
    [Show full text]
  • A Privacy-Aware and Secure System for Human Memory Augmentation
    A Privacy-aware and Secure System for Human Memory Augmentation Doctoral Dissertation submitted to the Faculty of Informatics of the Università della Svizzera italiana in partial fulfillment of the requirements for the degree of Doctor of Philosophy presented by Agon Bexheti under the supervision of Prof. Marc Langheinrich September 2019 Dissertation Committee Prof. Antonio Carzaniga Università della Svizzera italiana, Switzerland Prof. Fernando Pedone Università della Svizzera italiana, Switzerland Prof. Cecilia Mascolo University of Cambridge, United Kingdom Prof. Claudio Bettini Università degli Studi di Milano, Italy Dissertation accepted on 06 September 2019 Research Advisor PhD Program Director Prof. Marc Langheinrich Prof. Walter Binder and Prof. Silvia Santini i I certify that except where due acknowledgement has been given, the work presented in this thesis is that of the author alone; the work has not been submit- ted previously, in whole or in part, to qualify for any other academic award; and the content of the thesis is the result of work which has been carried out since the official commencement date of the approved research program. Agon Bexheti Lugano, 06 September 2019 ii Abstract The ubiquity of digital sensors embedded in today’s mobile and wearable devices (e.g., smartphones, wearable cameras, wristbands) has made technology more intertwined with our life. Among many other things, this allows us to seamlessly log our daily experiences in increasing numbers and quality, a process known as “lifelogging”. This practice produces a great amount of pictures and videos that can potentially improve human memory. Consider how a single photograph can bring back distant childhood memories, or how a song can help us reminisce about our last vacation.
    [Show full text]
  • Ethics of the Sensor
    Ph.D. THESIS Ethics of Lifelog Technology By Tim Jacquemard, B.A., M.A. School of Computing Supervisors: Prof. Bert Gordijn Prof. Alan F. Smeaton September, 2014 Dublin City University Declaration I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of Ph.D. is entirely my own work, that I have exercised reasonable care to ensure that the work is original, and does not to the best of my knowledge breach any law of copyright, and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work. Signed: ID No.: Date: Acknowledgements As I have come to see, a Ph.D. is never the work of one person, but the result of the combined efforts of many. Firstly, I am thankful to my supervisors, Alan and Bert, for their guidance and feedback throughout the process. Special thanks to Bart, Elizabeth, Fiachra, Jurjen, Peter, Renaat, and Wouter for their invaluable contributions as editors and/or technical support. Lastly, I would like to show my warm gratitude to Louise, my parents, my sister, my family and friends in Dublin, the Netherlands, and beyond. I am incredibly fortunate to have such a loving and supportive environment. Contents Abstract ............................................................................................................................................................ i List of Tables ...................................................................................................................................................
    [Show full text]
  • Public Interest Comment
    PUBLIC INTEREST Bridging the gap between academic ideas and real-world problems COMMENT THE BENEFITS, CHALLENGES, AND POTENTIAL ROLES FOR THE GOVERNMENT IN FOSTERING THE ADVANCEMENT OF THE INTERNET OF THINGS ADAM THIERER Senior Research Fellow, Mercatus Center at George Mason University Agency: National Telecommunications Information Administration, Department of Commerce Proposed: April 5, 2016 Comment period closes: June 2, 2016 Submitted: June 1, 2016 Docket ID: 160331306–6306–01 My name is Adam Thierer, and I am a senior research fellow at the Mercatus Center at George Mason University, where I study technology policy. Along with other Mercatus Center schol- ars, I have conducted extensive research on the questions raised in the NTIA’s Internet of Things (IoT) proceeding. Accordingly, I am pleased to submit for the record two recently published Mercatus Center articles. The first article is a compendium of statistics on the economic impact of the IoT and wearables that I coauthored with Andrea Castillo.1 The second is a law review article I authored for the Richmond Journal of Law and Technology last year.2 1. Adam Thierer and Andrea Castillo, “Projecting the Growth and Economic Impact of the Internet of Things,” Eco- nomic Perspectives, Mercatus Center at George Mason University, June 15, 2015, http://mercatus.org/publication/ projecting-growth-and-economic-impact-internet-things. 2. Adam Thierer, “The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation,” Richmond Journal of Law and Technology 21, no. 6 (2015), http://papers.ssrn.com/sol3/papers. cfm?abstract_id=2494382. For more information, contact Taylor Barkley, Assistant Director of Outreach for Technology Policy 703-993-8205, [email protected] Mercatus Center at George Mason University 3434 Washington Boulevard, 4th Floor, Arlington, VA 22201 There are two key takeaways from these publications.
    [Show full text]
  • Life-Swap: How Discussions Around Personal Data Can Motivate Desire for Change
    Rowanne Fleck1 (0000-0002-7017-4474) (corresponding author) Marta E. Cecchinato2 (0000-0002-0627-8658) Anna L. Cox3 (0000-0003-2231-2964) Daniel Harrison2 (0000-0002-5710-7349) Paul Marshall4 (0000-0003-2950-8310) Jea Hoo Na5 (0000-0002-0020-1713) Anya Skatova6 (0000-0003-0300-4990) 1. School of Computer Science, University of Birmingham, Edgbaston, Birmingham B15 2TT, UK. [email protected] 0121 414 4789 2. Computer and Information Sciences dept., Northumbria University, 2 Ellison Place, Newcastle upon Tyne, NE1 8ST, UK. 3. UCL Interaction Centre, University College London, 2nd floor 66-72 Gower Street, London WC1E 6BT, UK 4. Department of Computer Science, Merchant Venturers Building, Woodland Road, Clifton, Bristol, United Kingdom 5. Manchester School of Art | Manchester Metropolitan University, 1.02 Righton Building, Cavendish Street Manchester M15 6BG, UK 6. School of Psychological Science, University of Bristol, 12a, Priory Road, Bristol BS8 1TU, UK Life-Swap: How Discussions Around Personal Data Can Motivate Desire for Change Abstract Personal informatics technologies support the collection of and reflection on personal data, but enabling people to learn from and act on this data is still an on-going challenge. Sharing and discussing data is one way people can learn from it, but as yet, little research explores how peer discourses around data can shape understandings and promote action. We ran 3 workshops with 5-week follow-ups, giving 18 people the opportunity to swap their data and discuss it with another person. We found this helped them re-contextualise and better understand their data, identify new strategies for changing their behaviour and motivated people to commit to changes in the future.
    [Show full text]
  • 92 an Offensive and Defensive Exposition of Wearable Computing
    An Offensive and Defensive Exposition of Wearable Computing PRAKASH SHRESTHA and NITESH SAXENA, University of Alabama at Birmingham, USA Wearable computing is rapidly getting deployed in many—commercial, medical, and personal—domains of day-to-day life. Wearable devices appear in various forms, shapes, and sizes and facilitate a wide variety of applications in many domains of life. However, wearables raise unique security and privacy concerns. Wearables also hold the promise to help enhance the existing security, privacy, and safety paradigms in unique ways while preserving the system’s usability. The contribution of this research literature survey is threefold. First, as a background, we identify a wide range of existing as well as upcoming wearable devices and investigate their broad applications. Second, we provide an exposition of the security and privacy of wearable computing, studying dual aspects, that is, both attacks and defenses. Third, we provide a comprehensive study of the potential security, privacy, and safety enhancements to existing systems based on the emergence of wearable technology. Although several research works have emerged exploring different offensive and defensive uses of wearables, there is a lack of abroad and precise literature review systematizing all those security and privacy aspects and the underlying threat models. This research survey also analyzes current and emerging research trends and provides directions for future research. CCS Concepts: • General and reference → Surveys and overviews;•Security and privacy → Authen- tication; Privacy-preserving protocols; Privacy protections; Additional Key Words and Phrases: Wearable computing, security requirements, side-channel analysis and countermeasures ACM Reference format: Prakash Shrestha and Nitesh Saxena. 2017.
    [Show full text]
  • The Internet of Things and Wearable Technology Addressing Privacy and Security Concerns Without Derailing Innovation
    The Internet of Things and Wearable Technology Addressing Privacy and Security Concerns without Derailing Innovation Adam Thierer November 2014 MERCATUS WORKING PAPER All studies in the Mercatus Working Paper series have followed a rigorous process of academic evaluation, including (except where otherwise noted) at least one double-blind peer review. Working Papers present an author’s provisional findings, which, upon further consideration and revision, are likely to be republished in an academic journal. The opinions expressed in Mercatus Working Papers are the authors’ and do not represent official positions of the Mercatus Center or George Mason University. Adam Thierer. “The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation.” Mercatus Working Paper, Mercatus Center at George Mason University, Arlington, VA, November 2015. http://mercatus.org/publication /internet-things-and-wearable-technology-addressing-privacy-and-security-concerns-without. Abstract This paper highlights some of the opportunities presented by the rise of the so-called Internet of Things in general and wearable technology in particular and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable technology will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. The better alternative to top-down regulation is to deal with those concerns creatively as they develop, using a combination of educational efforts, technological empowerment tools, social norms, public and watchdog pressure, industry best practices and self-regulation, transparency, and targeted enforcement of existing legal standards (especially torts), as needed.
    [Show full text]
  • Phd Thesis, Dublin City University, 2013
    Lifelog Access Modelling using MemoryMesh Lijuan Zhou Master of Science in Computer Science (Hons.) A dissertation submitted in fulfilment of the requirements for the award of Doctor of Philosophy (Ph.D.) to the Dublin City University Faculty of Engineering and Computing, School of Computing Supervisor: Dr. Cathal Gurrin January, 2016 Declaration I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of Doctor of Philosophy is entirely my own work, and that I have exercised reasonable care to ensure that the work is original, and does not to the best of my knowledge breach any law of copyright, and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work. Signed: (Lijuan Zhou) Student ID: 11212053 Date: Table of Contents List of Tables 10 List of Figures 13 List of Nomenclature 16 Abstract 18 1 Introduction 1 1.1 Motivation . .1 1.2 Significance of This Research . .7 1.3 Hypothesis . 11 1.4 Research Questions . 15 1.5 Terminology . 16 1.6 Contribution and Novelty . 22 1.7 Thesis Organisation . 23 Acknowledgements 1 2 Overview of Lifelogging: Trends and Methods 25 2.1 Introduction . 25 2.2 Five Ws of Lifelog . 26 3 2.2.1 What is Lifelogging? . 26 2.2.2 Why Lifelog? . 27 2.2.3 HoW We Can Log Life? . 29 2.2.4 Who Can Benefit From Lifelogs . 36 2.2.5 When to Do Lifelog .
    [Show full text]
  • The Emerging Internet of Things Marketplace from an Industrial
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING 1 The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey Charith Perera, Member, IEEE, Chi Harold Liu Member, IEEE, Srimal Jayawardena, Member, IEEE, Abstract—The Internet of Things (IoT) is a dynamic global There have been a number of surveys conducted in the IoT information network consisting of internet-connected objects, domain. The area of the IoT has been broadly surveyed by such as Radio-frequency identification (RFIDs), sensors, actu- Atzori et al. in [2]. Bandyopadhyay et al. have surveys of ators, as well as other instruments and smart appliances that are becoming an integral component of the future internet. Over the IoT middleware solutions in [4]. Layered architecture in the last decade, we have seen a large number of the IoT solutions industrial IoT are discussed in [5]. A similar survey focusing developed by start-ups, small and medium enterprises, large cor- on data mining techniques for the IoT are discussed in [6]. porations, academic research institutes (such as universities), and Edge mining in IoT paradigm is discussed in [7]. In contrast private and public research organisations making their way into to the traditional data mining, edge mining takes place on the the market. In this paper, we survey over one hundred IoT smart solutions in the marketplace and examine them closely in order wireless, battery-powered, and smart sensing devices that sit at to identify the technologies used, functionalities, and applications. the edge points of the IoT. The challenges in self organizing More importantly, we identify the trends, opportunities and open in IoT are discussed in [8].
    [Show full text]
  • Facebook Index.Pdf
    Index Symbols 2007 South By Southwest Interactive , 158 #ConnectTheWorld , 356 2008 U.S. presidential campaign , 202 #H2H , 110 2010 f8 Conference , 263 #McDStories , 161 2010 Times Square car bombing attempt , 359 #myNYPD , 161 2011 Egyptian revolution , 229 #stoptheterror , 224 2011 f8 Conference , 12, 40, 374 @amac , 151 2011 If Conference , 297 @AP , 174 2011 South by Southwest Conference , 260 @BarackObama , 156, 202 2011 State of the Union Address , 203, 349, @biz , 151 373 @ComfortablySmug , 173 2011 Thiel Fellowship , 35 @DalaiLama , 156 2012 Academy Awards , 163 @FDNY , 156 2012 Ad Age Digital Conference , 99 @FutureExBanker , 171 2012 Black Hat security conference , 141 @HiddenCash , 164 2012 D: Dive Into Media Conference , 38 @HillaryClinton , 230 2012 Digital Life Design Conference (DLD) , @jimmy_wales , 216 49, 145, 256 @KendallJenner , 210 2012 Hacker Cup competition , 28 @KremlinRussia_E , 156 2012 LeWeb London Conference , 44 @MichelleObama , 156 2012 London Olympics , 257 @Pontifex , 160 2012 RSA conference , 283 @PopeBenedictXIV , 156 2012 South by Southwest Conference , 39, @ReallyVirtual , 154 154, 220, 225, 332 @SAPresident , 156 2012 TED Conference , 206, 307, 356 @Wendi_Deng , 183 2012 TEDGlobal conference , 48 2012 Worldwide Developers Conference , 79 2013 RSA conference , 14 Numbers 2013 TechCrunch Disrupt Conference , 13 1-800-273-TALK , 309 2013 TED Conference , 331 1-877-ID-THEFT , 285 2014 Apple Worldwide Developers 100 Most Infl uential People of 2009 , 185 Conference (WWDC) , 73 15 minutes of fame , 38 2014 Consumer Action Handbook , 268 1960 U.S. presidential election , 201 2014 Digital Submit , 357 1992 Los Angeles riots , 319 2014 f8 Conference , 48, 52, 106, 379 1995 Data Protection Directive , 144 2014 FIFA World Cup , 176 1Password , 286 2014 Miss America , 164 © Springer Science+Business Media New York 2014 383 N.
    [Show full text]
  • Horizon Report > 2013 Higher Education Edition
    NMC Horizon Report > 2013 Higher Education Edition The NMC Horizon Report is an unbiased source of information that helps education leaders, trustees, policy makers, and others easily understand the impact of key emerging technologies on education, and when they are likely to enter mainstream use. 1 Contents > Click on a topic or page number to jump to that page. Executive Summary 3 Key Trends 7 Significant Challenges 9 Time-to-Adoption Horizon: One Year or Less > Massively Open Online Courses 11 > Tablet Computing 15 Time-to-Adoption Horizon: Two to Three Years > Games and Gamification 20 > Learning Analytics 24 Time-to-Adoption Horizon: Four to Five Years > 3D Printing 28 > Wearable Technology 32 The NMC Horizon Project 36 Methodology 38 The NMC Horizon Project: 2013 Higher Education Edition Advisory Board 40 Interested in these emerging technology topics? Learn more about them and other edtech insights by “liking” us on Facebook at facebook.com/newmediaconsortium and following us on Twitter at twitter.com/nmcorg. NMC The NMC Horizon Report: 2013 Higher Education Edition is a collaboration between the New Media Consortium and the EDUCAUSE Learning Initiative, an EDUCAUSE Program. The research behind the NMC Horizon Report: 2013 Higher Education The NMC Horizon Report: 2013 Higher Education Edition is jointly conducted by the New Media Consortium (NMC) and Edition is made possible via a grant from HP. the EDUCAUSE Learning Initiative (ELI), an EDUCAUSE Program. The ELI’s critical participation in the production of this report and their strong HP creates innovative technology solutions that benefit individuals, support for the NMC Horizon Project is gratefully acknowledged.
    [Show full text]
  • The Buxton - Microsoft Collection Inventory of Interactive Device Collection
    The Buxton - Microsoft Collection Inventory of Interactive Device Collection Bill Buxton First Draft: August 29th, 2011 Contents: 1. Mice 11. Pen Computers 2. Tablet Pucks and Pens 12. Watches 3. Touch Pads 13. Wearables: Gloves, Rings, 4. Touch Screens Heads, etc. 5. Joysticks 14. Pedals 6. Trackballs 15. Game Controllers & Toys 7. Chord Keyboards 16. Remote Controls 8. Keyboards 17. Dials 9. Handhelds, PDAs, Music 18. Miscellaneous Players, Games, Mobile 19. Reference Material, Toys, … Phones 20. Purging from Collection 10. e-Readers Note: • Devices that have a “Y” in the right-most column are included in the current collection web-site which can be accessed here: https://www.microsoft.com/buxtoncollection. Note that perhaps less than 1/3 of the collection is on-line, and for the most part, the entries for those that are on-line are minimal (though hopefully still useful), compared to what is being prepared. A new, complete site is under curation and will be posted as soon as possible – but don’t hold your breath. It’s a big job. • Devices with a red “N” in the rightmost column are in the process of being documented and prepared for inclusion on the web site. For requests for photos or other details of items not yet on the site, contact me via email. • The Catalogue Code in the second column tells me where the item is stored. This code is in the form BBB-NNN, where BBB is the bin code & NNN (not always used) is the 3-digit item number in that bin Page 1 of 146 Version: May 12, 2021 Mice Photo Code Name Year Price Compan Notes Pivot? y M-06 NRC 1968 NFS National Donated by Nestor Burtnyk.
    [Show full text]